{"id":"CVE-2016-6621","details":"The setup script for phpMyAdmin before 4.0.10.19, 4.4.x before 4.4.15.10, and 4.6.x before 4.6.6 allows remote attackers to conduct server-side request forgery (SSRF) attacks via unspecified vectors.","aliases":["GHSA-44vv-mm86-7cg6"],"modified":"2026-04-16T01:42:13.175843647Z","published":"2017-01-31T19:59:00.260Z","related":["openSUSE-SU-2024:10054-1"],"references":[{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2018/07/msg00006.html"},{"type":"ADVISORY","url":"http://www.securityfocus.com/bid/95914"},{"type":"ADVISORY","url":"https://www.phpmyadmin.net/security/PMASA-2016-44/"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/phpmyadmin/phpmyadmin","events":[{"introduced":"0"},{"last_affected":"8783113cec408ad9a81f17e3a97db6c4732e6164"},{"last_affected":"1fe735d098d82ad79500eab04c4d25ba8fe25a24"},{"last_affected":"6ab95d9bec50f6be6b5439abed35f99ab3fa5cbc"},{"last_affected":"e4db51c0d47ac6e319ba93ce0d5706a33f736c00"},{"last_affected":"1c1753bb6666381fa2cd2cd1f160286935244a35"},{"last_affected":"d8f4a2d661f78281db7ee6826651ffc9574a2b31"},{"last_affected":"243ed0268fa15567c8a787eeb6055a232102b91a"},{"last_affected":"86a7d2704994c43a4fae11cf38105fc3cb3d4d5b"},{"last_affected":"dba2af651a53d5037296a1dc827081a94ef1062c"},{"last_affected":"409c9bc50aa447c52d334c839f4aa239f66c5e03"},{"last_affected":"a62fcf03af4c7f9df2393fbe58ae8653166763fa"},{"last_affected":"b478a3d5c4fc1341a0a77235d2afbd2b4e4d0a6c"},{"last_affected":"5b0543da6915bac44cb15e7e73f9e1886fe57588"},{"last_affected":"a1b4ecc69bc4ac90a54e3f3c8644ca18f13b010d"},{"last_affected":"b0d60e271a6f47d2e0ecd81ad620b5d185acc0b1"},{"last_affected":"426c5d9c1ded024c9306428ce165ae82d6f6d5df"},{"last_affected":"78a6214afcee3a6b65eb5e1ac261aa8e70f36736"},{"last_affected":"95104ff56e15876c6b481e09c9f0169e34b781f8"},{"last_affected":"f7f483e99a74648843cc87265033442aeb4b7342"},{"last_affected":"3fc737460caa3c47d9d51751d712cc8784b1dfef"},{"last_affected":"fecf8b76ef831be0a5a8fddb1c3edf4251e92076"},{"last_affected":"daf86cd1e369f63ad132d8dc63a7217267030408"},{"last_affected":"c21937440af0b0b2ed752f229c3d2523ac178d85"},{"last_affected":"32f512698518214fcc59ea45e0f35b0aedff16cb"},{"last_affected":"b7c2e99987c2c52c6e8010b55b75f3c1c039216a"},{"last_affected":"1f1e63cd5956eca847891b28b24e90ceaeaeb009"},{"last_affected":"39864227e7c33f9a6ef29890017e48164df54858"},{"last_affected":"0748384685693e3ecf97b021ccab075e295d4d65"},{"last_affected":"37b38431d167915675fc8ab512470528147e72de"},{"last_affected":"a6ecc52b3d1245a30d270d871992f2fedcf84be6"},{"last_affected":"73fd0dc2a8f5471c717a887aae22bde97bc5498f"},{"last_affected":"0fc00c0ab895cf83883ce43435f9563019e1b0f5"},{"last_affected":"07fd0bce678e83d5f81d7a683f1052fe45764d0c"},{"last_affected":"35e191d74b50c8f5a7b87fa9889869cc3a88255d"},{"last_affected":"b9a6a9993e175ff13375462333ce1139095d01e1"},{"last_affected":"253894e2995ae4175f4429bf5cdaedfb6a722988"}],"database_specific":{"cpe":["cpe:2.3:a:phpmyadmin:phpmyadmin:*:*:*:*:*:*:*:*","cpe:2.3:a:phpmyadmin:phpmyadmin:4.4.0:*:*:*:*:*:*:*","cpe:2.3:a:phpmyadmin:phpmyadmin:4.4.1:*:*:*:*:*:*:*","cpe:2.3:a:phpmyadmin:phpmyadmin:4.4.1.1:*:*:*:*:*:*:*","cpe:2.3:a:phpmyadmin:phpmyadmin:4.4.2:*:*:*:*:*:*:*","cpe:2.3:a:phpmyadmin:phpmyadmin:4.4.3:*:*:*:*:*:*:*","cpe:2.3:a:phpmyadmin:phpmyadmin:4.4.4:*:*:*:*:*:*:*","cpe:2.3:a:phpmyadmin:phpmyadmin:4.4.5:*:*:*:*:*:*:*","cpe:2.3:a:phpmyadmin:phpmyadmin:4.4.6:*:*:*:*:*:*:*","cpe:2.3:a:phpmyadmin:phpmyadmin:4.4.6.1:*:*:*:*:*:*:*","cpe:2.3:a:phpmyadmin:phpmyadmin:4.4.7:*:*:*:*:*:*:*","cpe:2.3:a:phpmyadmin:phpmyadmin:4.4.8:*:*:*:*:*:*:*","cpe:2.3:a:phpmyadmin:phpmyadmin:4.4.9:*:*:*:*:*:*:*","cpe:2.3:a:phpmyadmin:phpmyadmin:4.4.10:*:*:*:*:*:*:*","cpe:2.3:a:phpmyadmin:phpmyadmin:4.4.11:*:*:*:*:*:*:*","cpe:2.3:a:phpmyadmin:phpmyadmin:4.4.12:*:*:*:*:*:*:*","cpe:2.3:a:phpmyadmin:phpmyadmin:4.4.13:*:*:*:*:*:*:*","cpe:2.3:a:phpmyadmin:phpmyadmin:4.4.13.1:*:*:*:*:*:*:*","cpe:2.3:a:phpmyadmin:phpmyadmin:4.4.14.1:*:*:*:*:*:*:*","cpe:2.3:a:phpmyadmin:phpmyadmin:4.4.15:*:*:*:*:*:*:*","cpe:2.3:a:phpmyadmin:phpmyadmin:4.4.15.1:*:*:*:*:*:*:*","cpe:2.3:a:phpmyadmin:phpmyadmin:4.4.15.2:*:*:*:*:*:*:*","cpe:2.3:a:phpmyadmin:phpmyadmin:4.4.15.3:*:*:*:*:*:*:*","cpe:2.3:a:phpmyadmin:phpmyadmin:4.4.15.4:*:*:*:*:*:*:*","cpe:2.3:a:phpmyadmin:phpmyadmin:4.4.15.5:*:*:*:*:*:*:*","cpe:2.3:a:phpmyadmin:phpmyadmin:4.4.15.6:*:*:*:*:*:*:*","cpe:2.3:a:phpmyadmin:phpmyadmin:4.4.15.8:*:*:*:*:*:*:*","cpe:2.3:a:phpmyadmin:phpmyadmin:4.4.15.9:*:*:*:*:*:*:*","cpe:2.3:a:phpmyadmin:phpmyadmin:4.6.0:*:*:*:*:*:*:*","cpe:2.3:a:phpmyadmin:phpmyadmin:4.6.0:alpha1:*:*:*:*:*:*","cpe:2.3:a:phpmyadmin:phpmyadmin:4.6.0:rc1:*:*:*:*:*:*","cpe:2.3:a:phpmyadmin:phpmyadmin:4.6.0:rc2:*:*:*:*:*:*","cpe:2.3:a:phpmyadmin:phpmyadmin:4.6.1:*:*:*:*:*:*:*","cpe:2.3:a:phpmyadmin:phpmyadmin:4.6.2:*:*:*:*:*:*:*","cpe:2.3:a:phpmyadmin:phpmyadmin:4.6.4:*:*:*:*:*:*:*","cpe:2.3:a:phpmyadmin:phpmyadmin:4.6.5:*:*:*:*:*:*:*"],"extracted_events":[{"introduced":"0"},{"last_affected":"4.0.10.18"},{"last_affected":"4.4.0"},{"last_affected":"4.4.1"},{"last_affected":"4.4.1.1"},{"last_affected":"4.4.2"},{"last_affected":"4.4.3"},{"last_affected":"4.4.4"},{"last_affected":"4.4.5"},{"last_affected":"4.4.6"},{"last_affected":"4.4.6.1"},{"last_affected":"4.4.7"},{"last_affected":"4.4.8"},{"last_affected":"4.4.9"},{"last_affected":"4.4.10"},{"last_affected":"4.4.11"},{"last_affected":"4.4.12"},{"last_affected":"4.4.13"},{"last_affected":"4.4.13.1"},{"last_affected":"4.4.14.1"},{"last_affected":"4.4.15"},{"last_affected":"4.4.15.1"},{"last_affected":"4.4.15.2"},{"last_affected":"4.4.15.3"},{"last_affected":"4.4.15.4"},{"last_affected":"4.4.15.5"},{"last_affected":"4.4.15.6"},{"last_affected":"4.4.15.8"},{"last_affected":"4.4.15.9"},{"last_affected":"4.6.0"},{"last_affected":"4.6.0-alpha1"},{"last_affected":"4.6.0-rc1"},{"last_affected":"4.6.0-rc2"},{"last_affected":"4.6.1"},{"last_affected":"4.6.2"},{"last_affected":"4.6.4"},{"last_affected":"4.6.5"}],"source":"CPE_FIELD"}}],"versions":["RELEASE_2_2_0","RELEASE_2_2_1","RELEASE_2_2_2","RELEASE_2_2_3","RELEASE_2_2_4","RELEASE_2_2_5","RELEASE_2_2_6","RELEASE_2_2_7PL1","RELEASE_2_3_0","RELEASE_2_3_1","RELEASE_2_3_2","RELEASE_2_3_3PL1","RELEASE_2_4_0","RELEASE_2_5_0","RELEASE_2_5_1","RELEASE_2_5_2","RELEASE_2_5_4","RELEASE_2_5_5PL1","RELEASE_2_5_6","RELEASE_2_5_7PL1","RELEASE_2_6_1PL3","RELEASE_2_6_2PL1","RELEASE_2_6_3PL1","RELEASE_2_6_4PL4","RELEASE_2_7_0PL2","RELEASE_2_8_0_4","RELEASE_2_8_1","RELEASE_2_8_2_4","RELEASE_2_9_0","RELEASE_3_4_0RC2","RELEASE_3_5_0ALPHA1","RELEASE_4_0_0ALPHA2","RELEASE_4_0_0BETA3","RELEASE_4_0_0RC1","RELEASE_4_0_0RC2","RELEASE_4_0_0RC3","RELEASE_4_0_10","RELEASE_4_0_10_1","RELEASE_4_0_10_10","RELEASE_4_0_10_11","RELEASE_4_0_10_12","RELEASE_4_0_10_13","RELEASE_4_0_10_15","RELEASE_4_0_10_16","RELEASE_4_0_10_17","RELEASE_4_0_10_18","RELEASE_4_0_10_2","RELEASE_4_0_10_3","RELEASE_4_0_10_4","RELEASE_4_0_10_5","RELEASE_4_0_10_6","RELEASE_4_0_10_7","RELEASE_4_0_10_8","RELEASE_4_0_10_9","RELEASE_4_1_0ALPHA1","RELEASE_4_1_0BETA1","RELEASE_4_1_0BETA2","RELEASE_4_2_0ALPHA2","RELEASE_4_2_0BETA1","RELEASE_4_4_0","RELEASE_4_4_0ALPHA1","RELEASE_4_4_1","RELEASE_4_4_10","RELEASE_4_4_11","RELEASE_4_4_12","RELEASE_4_4_13","RELEASE_4_4_13_1","RELEASE_4_4_14","RELEASE_4_4_14_1","RELEASE_4_4_15","RELEASE_4_4_15_1","RELEASE_4_4_15_2","RELEASE_4_4_15_3","RELEASE_4_4_15_4","RELEASE_4_4_15_5","RELEASE_4_4_15_6","RELEASE_4_4_15_7","RELEASE_4_4_15_8","RELEASE_4_4_15_9","RELEASE_4_4_1_1","RELEASE_4_4_2","RELEASE_4_4_3","RELEASE_4_4_4","RELEASE_4_4_5","RELEASE_4_4_6","RELEASE_4_4_6_1","RELEASE_4_4_7","RELEASE_4_4_8","RELEASE_4_4_9","RELEASE_4_6_0","RELEASE_4_6_0ALPHA1","RELEASE_4_6_0RC1","RELEASE_4_6_0RC2","RELEASE_4_6_1","RELEASE_4_6_2","RELEASE_4_6_3","RELEASE_4_6_4","RELEASE_4_6_5"],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2016-6621.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N"}]}